Retiree bmail Application

Size: px
Start display at page:

Download "Retiree bmail Application"

Transcription

1 Retiree bmail Application (Get or keep address) UC Berkeley Retirement Center 101 University Hall, Berkeley, CA retirement.berkeley.edu Tel: (510) Fax: (510) Name: Date: UCB Employee ID: Birth Date: Dept. at Retirement: Retirement Date: Home Address: State: Are You Retired: City: Zip: Phone No:! Staff! Emeriti need not complete this form contact your home department Do you currently have a bmail account, or did you have one at retirement?! Yes! No! I certify that I have officially retired or will soon retire from UCB, LBNL, or UCOP and have received a lump-sum payment or pension from UCRS. Note: This service does not provide internet access. You must have a separate Internet Service Provider (ISP), such as AOL, SBC Yahoo!, Comcast, etc. to access your via the internet. Address Your address is usually your CalNet ID followed If you already have address, please list it here. If you do not have account, provide a first and second choice (i.e., yourname@berkeley.edu). address: Payment Information The charge for Retiree bmail is $70 per year, plus a onetime $10 set up fee. Payment by check or money order is due with this application. Make checks out for $80 payable to UC Regents. Please mail or hand-deliver this form with payment to the address above. 2nd Choice: Retiree bmail accounts are available to retirees of UC Berkeley, UCOP and LBNL to facilitate their continued association with the UC Berkeley community. Use of these electronic services is governed by the University of California Electronic Mail Policy and the Berkeley Campus Computer Use and Minimum Security Standards Policies. These services are not to be used for any commercial activities or activities expressly for the purpose of financial gain. I understand that misuse of these services may result in the revocation of these services. I agree to abide by these policies and the terms and conditions for use of these services. Further, I agree to pay the current annual charges for the Retiree bmail service. I understand that payments are to be made on an annual basis and cannot be refunded or prorated. Please allow five to ten business days to process your application. Signature: Date: Center Staff Use only Payment: Check #: Amount: Date Rec d: IST: ed! HCM: Open: From: to By: Closed: By: DB: Entered: By: Closed: By: 01/2014

2 What is a Retiree bmail account? Retiree bmail Service Retiree bmail provides students and staff with a campus address, a calendar, and document sharing service, all linked to the campus contacts directory. Retirees of UC Berkeley, UCOP and LBNL are eligible to have a Retiree bmail account through the UC Berkeley Retirement Center. Retiree bmail is accessed through your own Internet connection or through the web browser on any internet-connected computer. A Retiree bmail account includes all regular account features, including: address and bdrive, bcal, and contacts; the ability to send and receive ; ample (25GB as of June 2013) and document storage space; technical support from bmail consultants at consult@berkeley.edu, ( , ext. 125); and free anti-virus software downloads from Downloads require an active CalNet ID and passphrase (contact UCBRC for details). For details on the bmail and bconnected programs, refer to: Other policies and limitations of the basic bmail service also apply. All Retiree bmail users login with their CalNet ID and CalNet Passphrase. Most often, your CalNet ID followed is your address. If you do not have an active CalNet ID one will be set up for you when your application is processed. What is the charge for a Retiree bmail account? The charge is $70.00 annually, plus a one-time $10 set up fee. This charge is non-refundable and not prorated. Should you cancel your Retiree bmail account you simply will not be billed the following year. As soon as we receive your application at the UC Berkeley Retirement Center, your account will be created, usually within one week. Payment is due with application and may be made by check or money order. How do I pay? Submit your check made out to UC Regents with your application. Annual invoices are sent from the Retirement Center to the address provided on your application. All inquiries regarding your bill or account status should be directed to or via to: ucbrc@berkeley.edu Delinquent Payment Penalties and Procedures: Subsequent payments are due thirty days after you receive your annual invoice; once thirty days has passed, your account will be suspended until payment is received. If your account is suspended, you may lose all contents of your Retiree bmail account. Reinstatement of Service: When the past due amount is paid, your Retiree bmail access will be reinstated within seven business days. How do I cancel? Request for cancellation of your Retiree bmail account should be sent by to ucbrc@berkeley.edu or you can call Include the following information in your cancellation request: Name bmail address Postal Mailing address Phone number Effective date of cancellation Your account may be cancelled without notice if it appears to be associated with any violation of the Terms and Conditions of the UC Berkeley Computer Use Policy. How do I get help? For assistance setting up or accessing your Retiree bmail account, contact the Application Service Center Help Desk: Phone: , ext consult@berkeley.edu Or look online at the CSS Knowledge Base:

3 Revised: April 18, 2013 Minimum Standards for Security of Berkeley Campus Networked Devices The following minimum standards are required for devices connected to the campus network. 1. Software patch updates Campus networked devices must run software for which security patches are made available in a timely fashion. They also must have all currently available security patches installed. Exceptions may be made for patches that compromise the usability of critical applications. 2. Anti-virus software Anti-virus software for any particular type of device currently listed on the Approved Software website must be running and up-to-date on every level of device, including clients, file servers, mail servers, and other types of campus networked devices. 3. Host-based firewall software Host-based firewall software for any particular type of device currently listed on the Approved Software website must be running and configured according to the "Implementing Guidelines for the Minimum Standards for Security of Berkeley Campus Networked Devices", on every level of device, including clients, file servers, mail servers, and other types of campus networked devices. While the use of departmental firewalls is encouraged, they do not necessarily obviate the need for host-based firewalls. 4. Passwords Campus electronic communications systems or services must identify users and authorize access by means of passwords or other secure authentication processes (e.g. biometrics or Smart Cards). When passwords are used, they must meet the Minimum Password Complexity Standards. In addition, shared-access systems must enforce these standards whenever possible and appropriate and require that users change any pre-assigned passwords immediately upon initial access to the account. All default passwords for access to network-accessible devices must be modified. Where possible and appropriate: 1. devices should be configured with separate accounts for privileged and unprivileged access; 2. users should authenticate with an unprivileged account rather than a privileged account; 3. privileged access should occur through a privilege escalation mechanism which allows the log to show which user was granted additional privileges; 4. and privileged access should only be granted for as long as necessary to complete the task which requires additional privileges

4 5. No unencrypted authentication Unencrypted device authentication mechanisms are only as secure as the network upon which they are used. Traffic across the campus network may be surreptitiously monitored, rendering these authentication mechanisms vulnerable to compromise. Therefore, all campus devices must use only encrypted authentication mechanisms unless otherwise authorized by the CISPC. (See "Requests for Exception" in the Berkeley Campus Policy on Minimum Standards for Networked Device Security Configurations.) In particular, historically insecure services such as Telnet, FTP, SNMP, POP, and IMAP must be replaced by their encrypted equivalents. Traffic for one-time password authentication systems (e.g. S/Key, OPIE, SecureID) is exempted from this encryption requirement, because its exposure does not compromise the integrity of the underlying authentication system. 6. No unauthenticated relays Campus devices must not provide an active SMTP service that allows unauthorized third parties to relay messages, i.e., to process an message where neither the sender nor the recipient is a local user. Before transmitting to a non-local address, the sender must authenticate with the SMTP service. Authenticating the machine (e.g. IP address/domain name) rather than the sender is not sufficient to meet this standard. Unless an unauthenticated relay service has been reviewed by SNS and approved by the CISPC as to configuration and appropriate use, it may not operate on the campus network. 7. No unauthenticated proxy services Although properly configured unauthenticated proxy servers may be used for valid purposes, such services commonly exist only as a result of inappropriate device configuration. Unauthenticated proxy servers may enable an attacker to execute malicious programs on the server in the context of an anonymous user account. Therefore, unless an unauthenticated proxy server has been reviewed by SNS and approved by the CISPC as to configuration and appropriate use, it is not allowed on the campus network. In particular, software program default settings in which proxy servers are automatically enabled must be identified by the system administrator and re-configured to prevent unauthenticated proxy services. For more information on the types of software typically used for proxy services, see the "Implementing Guidelines for the Minimum Standards for Security of Berkeley Campus Networked Devices". 8. Physical security Unauthorized physical access to an unattended device can result in harmful or fraudulent modification of data, fraudulent use, or any number of other potentially dangerous situations. In light of this, where possible and appropriate, devices must be configured to "lock" and require a user to re-authenticate if left unattended for more than 20 minutes.

5 9. Unnecessary services If a service is not necessary for the intended purpose or operation of the device, that service shall not be running. The Policy mandating compliance with these Minimum Standards is the Berkeley Campus Policy on Minimum Standards for Networked Device Security Configurations For additional details to assist system administrators and end-users to configure their networked devices to comply with these Minimum Standards see: Appendix B Implementing Guidelines For assistance interpreting these Guidelines, or to request an exception from compliance with the Minimum Standards, contact: security-policy@berkeley.edu. University of California, Berkeley Terms and Conditions of Appropriate use for bmail bmail service users must comply with the bmail Requirements below, as well as with the University of California Electronic Communications Policy (ECP), the Berkeley Campus Computer Use Policy, the Campus Online Activities Policy, and all other laws and policies relevant to their conduct while using a Berkeley Campus electronic communication service. Users of bmail shall not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of the Campus or any department or unit of the Campus unless appropriately authorized to do so. Nevertheless, because communications sent via bmail indicate an individual's affiliation with the University of California, Berkeley, users are expected to show courtesy and consideration in all their bmail communications. bmail users must not waste resources or interfere with others' use of electronic communications services. For example, users shall not send or forward chain letters, send spam, or intentionally engage in other practices such as "denial of service attacks" that impede the availability of electronic communications services. 1. Users must not share their individual account password with others. If an authorized user shares the individual account's password, that authorized user may be held responsible for any misuse of the account that occurred as a result. 2. If a shared use account is needed to conduct University business, a departmental account may be set up. The authorized administrative official who sponsors a departmental account shall be responsible for ensuring appropriate use of that account by all users. 3. Users must not use their bmail account for any commercial use for personal profit, including publishing their bmail address for such commercial activity contacts. Users must not use their bmail account for any commercial use on behalf of other individuals or on behalf of groups, unless authorized by campus administrative officials as being in support of the campus (1).

6 Examples of Misuse: Specific examples of violations of these Terms and Conditions include but are not limited to: * violations of copyright law * sending harassing * knowingly forwarding or originating hoaxes, scams, or other types of fraudulent messages * intentionally sending viruses, worms, or other "malware" * sending unsolicited mass mailings without the consent of all addressees, unless authorized on behalf of the campus by an appropriate administrative official (2) * forging messages or masking the identity of an account * any commercial use for personal profit Non-Compliance In addition to any possible legal sanctions, users who violate these Terms and Conditions of Appropriate Use of bmail may be subject to temporary or permanent service restriction and/or to disciplinary action up to and including dismissal or expulsion. Actions taken in response to alleged violations, as well as avenues available to the user for appeals of actions, will be in accordance with the procedures and due process rights contained in the policy or agreement governing the user's affiliation with the University. General Information For clarification of policies and guidelines applying to Berkeley Campus computing and communications resources, including this Computer Use Policy, contact itpolicy@berkeley.edu. Related policies are available online at the Campus IT policies website. If you would like to obtain paper brochure copies of this Computer Use Policy, including quantities to distribute at your campus location, please contact itpolicy@berkeley.edu. Reporting Misuse Report misuse of campus electronic communication resources to abuse@berkeley.edu.

Minimum Standards for Connecting to the UCLA Network

Minimum Standards for Connecting to the UCLA Network Minimum Standards for Connecting to the UCLA Network Last April, the CSG approved a set of minimum standards for connecting to the UCLA network that were based on a policy that had been developed by Berkeley.

More information

IMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES

IMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY DAVIS IRVINE LOS ANGELES RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ ECONOMETRICS LABORATORY Institute of Business and Economic Research ECONOMETRICS

More information

Minimum Security Standards for Networked Devices

Minimum Security Standards for Networked Devices University of California, Merced Minimum Security Standards for Networked Devices Responsible Official: Chief Information Officer Responsible Office: Information Technology Issuance Date: Effective Date:

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

IT Governance Committee Review and Recommendation

IT Governance Committee Review and Recommendation IT Governance Committee Review and Recommendation Desired Change: Approval of this policy will establish Security Standards for the UCLA Logon Identity for anyone assigned a UCLA Logon ID/password and

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Guest Wireless Policy

Guest Wireless Policy Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017 University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017 Related Policies, Procedures, and Resources UAB Acceptable Use Policy, UAB Protection and Security Policy, UAB

More information

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Draft. Policies of Colorado State University University Policy. Category: Information Technology

Draft. Policies of Colorado State University University Policy. Category: Information Technology Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish

More information

IT ACCEPTABLE USE POLICY

IT ACCEPTABLE USE POLICY CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to

More information

13. Acceptable Use Policy

13. Acceptable Use Policy 13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State

More information

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources. MERCER UNIVERSITY SECTION: Policies and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY ACCESS AND USE POLICY EFFECTIVE: January 1, 2004 PURPOSE: To establish policies and procedures for the use of University-owned

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

*Viola Business Fiber Internet**

*Viola Business Fiber Internet** *Viola Business Fiber Internet** Business Name (Please Print): Address: City: State: Zip: Billing address if different: Business Phone ( ) Cell Phone: ( ) PACKAGES: Check all services for which you are

More information

CELLULAR TELEPHONE EQUIPMENT AND SERVICES POLICY

CELLULAR TELEPHONE EQUIPMENT AND SERVICES POLICY University Policies and Procedures 10-01.04 - CELLULAR TELEPHONE EQUIPMENT AND SERVICES POLICY I. Policy Statement: Employees must follow the procedures established by this policy to request Towson University

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY This ("the Policy") governs use of the Buckeye Internet service ("the Service"). All subscribers to the Service are required to comply with this. Failure

More information

Terms of Service. USER means the individual that creates and/or has access to manage or maintain

Terms of Service. USER means the individual that creates and/or has access to manage or maintain Terms of Service Tiggee LLC doing business as DNS Made Easy, (hereafter DNS Made Easy or Tiggee ), provides the service ( SERVICE or DNS Made Easy service ) subject to the terms and conditions set forth

More information

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line

More information

University Network Policies

University Network Policies BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these

More information

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way. 1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

FreedomNet Solutions Acceptable Use Policy ( )

FreedomNet Solutions Acceptable Use Policy ( ) FreedomNet Solutions Acceptable Use Policy (02.10.2017) This Acceptable Use Policy ( Acceptable Use ) is a guide to the tolerable use of Member accounts and the Services provided by FreedomNet Solutions.

More information

PRIMUS ACCEPTABLE USE POLICY

PRIMUS ACCEPTABLE USE POLICY PRIMUS ACCEPTABLE USE POLICY For purposes of this Agreement, You, users, and account holders are used interchangeably, and where applicable. These terms are subject to the Privileges and Immunities of

More information

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

EMPLOYEE USE OF TECHNOLOGY AGREEMENT 2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of

More information

Information Security Management System ISO/IEC 27001:2013

Information Security Management System ISO/IEC 27001:2013 Information Security Management System ISO/IEC 27001:2013 OF ICT FACILITIES PENGGUNAAN KEMUDAHAN ICT For PTM Use Only Date: 7 th June Written By: Junnaini Ismun Pengerusi Jawatankuasa ISMS Verified By:

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Wireless Communication Stipend Effective Date: 9/1/2008

Wireless Communication Stipend Effective Date: 9/1/2008 Category: Financial Policy applicable for: Faculty/Staff Policy Title: Policy Number: Wireless Communication Stipend Effective Date: 9/1/2008 Enabling Act(s) IRS rule 2.1.7 Policy Owner: Sr. VP for Administration

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Acceptable Use Policy. Effective January 2017

Acceptable Use Policy. Effective January 2017 Acceptable Use Policy Effective January 2017 THIS ACCEPTABLE USE POLICY IS A MATERIAL PART OF ANY AGREEMENT WITH STRAIGHTUPNET COMMUNICATIONS FOR PROVISION OF ITS SERVICES TO BUSINESS AND CONSUMER CUSTOMERS.

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL P: +61 2 9231 3644 E: admin@ccl.com.au W: www.ccl.com.au A.B.N. 72 000 111 Level 1 Selborne Chambers 174 Phillip Street Sydney NSW 2000 APPLICATION TO OPEN PORTS THROUGH THE FIREWALL Only outbound data

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines California State Polytechnic University, Pomona Server and Network Security Standard and Guidelines Version 1.7 April 4, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM NETWORK AND SERVER SECURITY

More information

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING

More information

Nomination of the. June 4, 2004 PROJECT LEADERS:

Nomination of the. June 4, 2004 PROJECT LEADERS: Nomination of the Berkeley Campus Information Technology Security Policy and the Minimum Standards for Security of Berkeley Campus Networked Devices for the LARRY SAUTTER AWARD June 4, 2004 PROJECT LEADERS:

More information

ICT Acceptable Use Policy for Students

ICT Acceptable Use Policy for Students ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88

More information

Campus Shared Services

Campus Shared Services Campus Shared Services UC Berkeley 1608 Fourth Street Berkeley, CA 94710 (510) 664-9000 EXT. 3 Updated 02/27/2018 Visiting Scholars/Visiting Student Researchers Follow-Up Information Campus Shared Services

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

ACCEPTABLE USE POLICY (AUP)

ACCEPTABLE USE POLICY (AUP) ACCEPTABLE USE POLICY (AUP): This Acceptable Use Policy (AUP) is incorporated by reference in your Master Service Agreement with Vlan24, Inc. At its sole discretion, Vlan24, Inc. may suspend or terminate

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed

More information

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016 Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.

1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 16, 2016. Replaces the prior version in its entirety. Capitalized terms used in these Document Cloud Additional Terms ( Additional

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

POLICIES AND PROCEDURES

POLICIES AND PROCEDURES Integrated Information Technology Services POLICIES AND PROCEDURES Utica College Email POLICY: Email is Utica College s sole accepted mechanism for official electronic communication in the normal conduct

More information

: Acceptable Use Policy

: Acceptable Use Policy : Acceptable Use Policy This Acceptable Use Policy ("Policy") describes the proper and prohibited use of 's Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy

More information

Acceptable Use Policy Updated 1/16/2018

Acceptable Use Policy Updated 1/16/2018 Acceptable Use Policy Updated 1/16/2018 THIS ACCEPTABLE USE POLICY ( AUP OR POLICY ) IS A MATERIAL PART OF ANY AGREEMENT WITH AIRLINK INTERNET SERVICES, LLC ( AIRLINK ) FOR ACCESS TO AND PROVISION OF BROADBAND

More information

RET CONSTRUCTION MANAGER CERTIFICATION INSTITUTE. Retired Handbook

RET CONSTRUCTION MANAGER CERTIFICATION INSTITUTE. Retired Handbook RET CONSTRUCTION MANAGER CERTIFICATION INSTITUTE Retired Handbook Purpose CCM RETIRED HANDBOOK The (CCM-RET) program has been developed by the Board of Governors to meet the needs of retired professionals

More information

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement

More information

The NIF. Presented by: Berkeley International Office 2299 Piedmont Avenue Berkeley, CA

The NIF. Presented by: Berkeley International Office 2299 Piedmont Avenue Berkeley, CA The NIF Presented by: Berkeley International Office 2299 Piedmont Avenue Berkeley, CA 94720-2321 http://internationaloffice.berkeley.edu What is The NIF? An online database Determines your need for an

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes Effective Date: 01/01/2014 Page 1 of 7 REVISION HISTORY Revision No. Revision Date Authors Description of Changes 1.0 11/04/2013 CISO Populate Into Standard Template APPROVED BY This Policy is established

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

The University of Tennessee. Information Technology Policy (ITP) Preamble

The University of Tennessee. Information Technology Policy (ITP) Preamble Preamble The policy for Use of Information Technology Resources at the University of Tennessee (UT) (Section 135, Part 01, of UT s Fiscal Policy Manual) regulates use of the University's information technology

More information

IGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services

IGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services IGNITE HOSTED PREMIUM MAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

Cornish College of the Arts, Information Technology Policy

Cornish College of the Arts, Information Technology Policy Table of Contents 1.0 Introduction and Overview 1.1 Mission 1.2 Preamble 1.3 Privacy 1.4 Liability 2.0 Responsibilities and Accountability 2.1 Students 2.2 Faculty and Staff 2.3 Violations of Policy 3.0

More information

Access to University Data Policy

Access to University Data Policy UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

GDPR Draft: Data Access Control and Password Policy

GDPR Draft: Data Access Control and Password Policy wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR

More information

Tularosa Communications, Inc. (TCI) General Service Terms and Conditions

Tularosa Communications, Inc. (TCI) General Service Terms and Conditions Tularosa Communications, Inc. (TCI) General Service Terms and Conditions Updated: June 11, 2018 Effective: June 11, 2018 APPLICABILITY These Terms and Conditions apply to all services provided by TCI unless

More information

Domain Hosting Terms and Conditions

Domain Hosting Terms and Conditions Domain Hosting Terms and Conditions Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents,

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Conjure Network LLC Privacy Policy

Conjure Network LLC Privacy Policy Conjure Network LLC Privacy Policy Effective September 28, 2018 Conjure Network LLC ( Conjure, us, we, or our ) operates http://www.conjure.network (the Site or Website ). This Privacy Policy (the Policy

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Annals of Mathematics Electronic License Agreement

Annals of Mathematics Electronic License Agreement Annals of Mathematics Electronic License Agreement Annals of Mathematics, Fine Hall-Washington Road, Princeton University, Princeton, NJ 08544-1000, USA. Fax: 1-609-258-1367 Phone: 1-609-258-4191. By this

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY Student Email Use page 1 NEW POLICY SUMMARY: This policy governs the use of email for students. Students do not have an expectation for privacy in their A&T emails. Appropriate and inappropriate uses are

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

Handbook December 2018

Handbook December 2018 Handbook December 2018 Table of Contents About this Handbook... 3 The EEP Program... 3 Objectives... 3 Benefits... 3 Education Provider Requirements... 4 Fees... 4 Features... 5 Benefits... 6 Application

More information

This descriptive document is intended as the basis for creation of a functional specification for 2

This descriptive document is intended as the basis for creation of a functional specification for 2 Introduction & Overview This document provides a framework for the rapid implementation of a certification and access 1 model for non-public Whois data for legitimate and lawful purposes.this model specifically

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

Internet Service Provider Agreement

Internet Service Provider Agreement Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable

More information